Author of the publication

Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication.

, and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1316-1321 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks., and . IACR Cryptology ePrint Archive, (2009)Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 206-214 (2013)Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method., and . IEEE Access, (2020)Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays., , and . Mob. Inf. Syst., (2016)Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1316-1321 (2003)New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms., , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 264-282. Springer, (2002)On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption., and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 475-482. Springer, (2016)An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module., and . Security and Management, page 408-413. CSREA Press, (2004)Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols., , , , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 173-186. Springer, (2006)Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks., , , , , , and . Comput. Secur., (2018)